HACKERLOI.pdf
Вставка
- Опубліковано 25 сер 2024
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/...
Full Web Ethical Hacking Course: www.udemy.com/...
Full Mobile Hacking Course: www.udemy.com/...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangya...
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
:)
:)
:D
I want to know that if it is possible to know is pdf okay or not without open it?
Ok sir then,how it'll work for Android
Missing the old intro 😥
Ay yes, now I can send my "Home work" to my teacher.
Yeah "home work"
Yeah "home work"
🤣🤣🤣
Ah yes, you just copied the same comment from Lio lang's malicous pdf video from 3 years ago and also doing this will get you expelled and arrested.
, 😂
This is really scary.. Thank you for spreading such amazing knowledge.
This very old hacking 🙂
But now hackers can do more scary things 🙂
@@rafimr5751 Ohh
@@rafimr5751 like what i really want to know just tell me the names
@@AmanKumar-hy5ck I can mine cryptocurrency on you device 😋
@@AmanKumar-hy5ck for that check my bio 🙂
i love the simplicity of your tutorials, keep going !
mr loi you are really genius,
love your content and ur way of simplifying the information
@Y K why not?
no
@Y K so just because he does a little easier tutorials, he's a script kiddy?
@Y K Yes, there is. but that's not really the point. You can't just claim that someone is something without knowing anything. Thats just hating ^^
@Y K 7, almost 8
My favorite channel! Thank you Loi Liang Yang!
i love this channel, you make things easy
they ARE easy if he uses them on this channel
Mr. Loi you have amazing brain and amazing way to learn us how we do it, THANK YOU.
you can learn all he says from manual of the programs
@@sbypasser819 where is that manual?
I Would Definitely open this file.
In my organization's production server.
RIP✋️💀
Best in the game... Fav channel of all time... Much love 🔥🔥🔥
There’s is few of questions I need to ask you which can a iPhone be used to do ethical hacking using ISH or etc? What about even a Chromebook tablet? Also how can someone get data from the air?
Also forgot to ask is it possible for someone with ADHD to become one of the best hackers? Currently struggling honestly even trying to make decent living but not giving up hope yet. Thanks I feel like your the best person to answer this honestly and one of my favorite teachers here on UA-cam.
Mr. Loi, i love this channel can you make a full explanation of how to use CVSS in every type of metric, thank you!.
when i set the playload how can i know the playload's file location?
and how can i know the email send to the target (demo)
Its only happen when the firewall and antivirus is disabled right? So keep your firewall and antivirus active and updated.
Well, a virus can add itself to exception and bypass those stuff so who knows. Never safe to completely just trust your anti-virus
@@Motoxrides a virus can not add itself an exception, the user needs to allow that exception xd..so...
@@danawhite7361 you haven ever seen viruses that did that? "The PC Security Channel" talked about such a virus a few years back.
@@TVPInterpolation need admin! user needs to agree
this video is so misleading. he's also using Adobe Reader 8.1, which means June 2007!!!! can you believe that?!
where pdf is stored?
infinite message "Waiting for payload generation to complete..." Could you fix that issue??
why you never use obfuscation, in the real world everybody has at least windows defender enabled.
and these payloads are easy to detect.
well.. 5:01 is the most important part. If you read WHAT you are opening there you will be just fine. Also, if you have the file in any other directory (in this case) you would not be trapped in a TCP reverse shell would you?
He's making real tutorials and all but he doesn't mention all that stuff on purpose, if you want to learn from him you are going to learn just the base (basically how to be a skid) and then you'll need to check yourself how to bypass all the other sh!t.
@@broz36_ i know bro. but many ppl here are conviced that there is nothing the target can do.
@@Suneeh1338 Yeah, he has to do something about it.
I mean, what can WE (the avarege viewer) can do about it?
It's not like you can make a YT channel and post the real sh!t there because it's gonna get taken down. (NullByte tried that)
Maybe making it into some puzzle so that only people that aren't just some "average viewers" can access and that will be outside of YT so it won't promote any illegal activities?
@@broz36_ exactly.
This exploit seems to be just for adobe reader, so you can just use firefox or microsoft edge (which is the default pdf reader on windows) to view the pdf
How long does it take to payload generation to complete? It seems for me it takes a very long time or is just looping indefinently both with ubuntu and kali linux
I thought it was only mine, I've tried several times but it keeps generating with no results for minutes/hour
@@vincentcj7548 yes
You the best of the best .much love from South Africa
Loi we want tutorials about hacking android phones, because they are the most uesd phones in the space 😁.
Guys hit like to rise up my comment
he will not, he just showed you an outdated exploit, look at the video, he was using Adobe Reader 8.1 (Release Date: June 2007).
@@L2002 the fact that the viewer is outdated says literally nothing about the exploit itself
@@Daniel-yt7ry TYL3R DURD3N
I love your videos but it would be nice to mention that you will have to first convince the victim to disable windows defender or do it yourself in any way :)
Is there a work around so that windows defender does not pick it up?
a normal payload can bypass windows defender but for pdf idk
this taking so much time for generating payload
I opened up the file but nothing appeared in the terminal
Sir, I don't know the path of the file "HACKERLOI.pdf" you created in the video.where is it....???
Me too i don't know where is the PDF file
I have the same question, someone know where is it?
@@felipearbelaez1360 just make a new document in the desktop and give it a name and embedd the payload inside that, thats it
Next time I'm sending out CVs for job applications, I'm going to use this XP
🤣🤣🤣
Due the issue of sending email Where can i find the new file
If I use my Android Galaxy S9, rooted & with AFWall+ installed, will opening the pdf-file still be as malicious, as it was shown here?
Love you man, and thanks for yet another amazing video.
❤
Amazing information. Love your videos. Regards from Sweden
Loi, won't Antivirus programs stop any pdf with an exe or some pdfs with exe attached the Antivirus programs will allow to pass if you crypt it properly with a never before seen crypter? Loi please answer.
there are encrypters for pdf files
@@pervysage4595 Can you tell me the name of one or more pdf encrypters? So what do they do? They will literally encrypt the pdf and the exe and make it look like what type of file to Antivirus programs?
@@mikevinitsky8506 you need to know basics of coding here, u can’t just use skid software abs expect to bypass av
@@edmorris4720 I'm a programmer. What is skid software?
@@mikevinitsky8506 lmao it means script kiddie. someone who uses other ppls stuff to hack and doesn’t write there own. like this backdoor maker. it won’t bypass av
After I change the name of the file I can't find it
I hope there will be a tutorial of how to detect if something happens to the user like this or a solution to avoid it like setting configuration or something. This makes me aware that not all doc/pdf files is safe. I wonder if this method is also applicable to videos. Like, when opening a video, it is also possible to get hacked.
I'm pretty sure that windows defender will block it
@@SunBlade4302 5:01 in the video.. he just accepts everything and OPENS it.. just read what you open guys :D
don't worry at all, this video is misleading. he was using Adobe Reader 8.1 (Release Date: June 2007). are you kidding me, 2007?
Yup even when opening an image
But its not that easy so not anyone can do it
And to be safe open unknown sources files on vps or rdp
Can you tell where the file is stored so that I can send that pdf
bruh did you find out
i cant figure it out rip
Hi
can any one tell me where can i find the pdf that i just made.
I dont find it
Everytime i get a payload is saves it to a root folder which i cant axcess any fixes?
Always motivated by your tutorials
What i do if i see you in my city
Run away
Just run don't look back
And hide your phone 😂
Can an internet security or an antivirus be able to stop this attack ? Say Kaspersky or Macafee ?
Great man, learning a litle every vídeo....thanks
this is just amazing than i expected, i love it
Amazing content . Thts all we can do in virtual environment. How can we get a meterpreter session for a device that is connected to public network i,e the internet.
How to know a pdf file have a payload?
Do you know where the PDF file saved?
Handsome hacker indeed👀
Please tell how to stop accessing the pc, like how can i stop accessing my own pc. ik its weird question but at least tell me.
Would love to hear a good tutorial on obfuscation, AV catches most of the stuff from SE
thats the where you need to learn to code comes in.
@@brodierobson4490 I'm guessing you work in education or a consultant or something. I agree that coding is important, but you can be in infosec with out being a strong coder. Obviously some python is important.
Old intro was dope. Bring it back please
HackerLoi you are my favorite Hacker to watch, you go through things quickly and precisely. Great job man.
Same
Please tell how to stop accessing the pc, like how can i stop accessing my own pc. ik its weird question but at least tell me.
@@zipp5022 If they already opened it that will do nothing.
@@addicted3105 You can go back to a previous version of your machine, assuming you're using windows.
Loi should be protected at all costs!
why? what he says can be learned from text sources
@@sbypasser819 not only that, he was using Adobe Reader 8.1 (Release Date: June 2007), 2007!!!
it already gets detected by windows defender ,,,, no use
yeah bro every msfvenom payload gets detected by antivirus gotta find the new way
@@renderset2937 True
@@renderset2937 you can make the metaspliote payload undetected by obfuscation
Do you know where the file is being saved after renaming it. I can't find it bro.
@@Rahul-nw5rp Google it
I want to know without showing the permission pop up , taking access of CMD is possible or not? I know its possible but how
Adobe XII can be hacked with this virus sir ?
Thank you for your video. Can we have more details on the technical part ?
A pdf isn't supposed to be able to handle an .exe files.
How does the trick work ?
idk, but i think he's showing us an outdated exploit without any notes to gain views, if you look at the video carefully, he was using Adobe Reader 8.1 (Date: June 2007).??? 2007 Seriously???
@@L2002 this is for educational purposes only of course he wont teach stuff that you can exploit you should have common sense if you want to be a real hacker
@@OpenYoureyes304 i know that, but at least he should say if the exploit is outdated or now
Thanks for teaching us real hacking ❤
thats ethical hacking
It's good to know this stuff but, any script kiddie can do this just as we are learning it or using it as a quick reminder/reference. To be a real hacker takes much more then using someone else tools.
@@SK-me9by to be real hacker you need to enable screen blocking and you need to know the keybinds for opening the system prompt function in hai.dll
But the pdf file is fishy since it prompts with some suspicious message before opening. How to avoid this?
No shootout to the black hat hackerloi is wearing
Hackerloi or hacker loi = hacker law in french
It doesn't work
Please, can you show us how you sent the mail by the setoolkit?
I tried but it doesn't send any mail or otherwise can you tell us where the file will be saved before been sent?
Thanks
Am i the only one who has problems with sending this file?
are that working with android if i want to hack phone?
I am writing this comment beacuse many people are worried , they are no able to do this⚠️
It will not work baecuse this exploit is for adobe 8.1. But the latest version of adobe is 21. And there is no working exploit for any adobe product at this time
🤣
Thankyou so much sir for giving us these knowledgeable video
I am a newbie. I read a document saying that to be able to insert malicious code into a file such as pdf, it will have a format like: abc.pdf.exe in your video. I don't see the exe extension at all. Was the documentation I read completely wrong?
yes, me too, i think it doesn't worok on gmail
how to do a pdf file
is it detectable by windows defender or other antiviruses??
What happens if you open a malicious Windows PDF on an Android device
I rickrolled my teacher with this method in the lockdown lmao
When you click that your machine showing a warning message that it could be a virus. So how to make it then it undetectable?
Setoolkit says it's done creating/editing the PDF but there is still no PDF anywhere. Why is this?
Mr Loi your video really helpful
5:01 well windows allready warns you about it, so read any pop up showed then click after reading carefully
3:30....after renaming the pdf file, how can I access it or find it??, so that I can mail it to user.
have you fixed?
@@ahinssu617 no still can't find the file, did you?
same problem, If you have fixed message me please :)
@@martinsuperfind7779 i think i figured it out i havent tested but your target has to be in the same exact network. you portfoward your network to avoid this. or host it on ngrok
@@mantavyapurohit1538 i think i figured it out i havent tested but your target has to be in the same exact network. you portfoward your network to avoid this. or host it on ngrok
Loi, in this videos we have know the target IP address. How to reconaissance the IP address which the target is in internet such as using smartphone, tablet, etc. Thanks
Once we get the IP, we can run the nmap command with -O option for OS Detection
Did not see where to get the pdf after downloading it
the pdf is saved under /root/.set
If a hacker did this would a factory reset remove the problem?
@DDD9216A oh true
I HAVE LINUX RUNNING IS A VM, WHERE DO I FIND THE PDF I CREATED??
Loi pls pls make video on brute forcing ssh, rlogin. Pls make video on Hydra u explain very well
This might be a dumb question but I hope to get a reply from you or any expert
I'm new to all of this so my question is, are sessions permanent?
I mean will I lose the connection if I close my PC?
if so how can I keep it permanent?
It's not permanent, look up a tool called weevely.
wrold cute and intelligent hacker i love your voice and you you are my inspection
Hackerloi after creating the pdf where is it please tell me
Like your channel/videos!! Keep it up!! What keyboard do you use? Like the sounds of the typing :)
When im sending it it says “unable to connect to mail server” how did you send it? Can someone help please
yes u can't with gmail
I get stock waiting for payload creation to be complete why?
Why target clicked on my file, but nothing happened ?
Can you help me this
what happens when that PDF open the file from an Android device ?
How to use the same concept on IOS devices especially new updated iPhones, i've tried it many many times with different payloads but still not working
Hey, i am been hacked for. Long time. I have an doubt, may be he has sim jacking attack my sim because he had my all personal info, i am very worried. What should i do??
Where will be the renamed file stored or it just changes the original file name.
The only downside is that the anti virus stops it
exactly this technique has been around for years but the antivirus detects it directly
How is the matter in Android used Termux +world list+numbers list
Unable to connect to mail server. Try again (Internet issues?)
I am constantly encountering this error code. Can you help me?
i try on my computer but.... the windows defender not let me run it or download it so this not work on win 7,8,10,11
But the pdf payload don’t work on all pdf reader, just old versions who don’t fix the exploit
you are right, he was using Adobe Reader 8.1 (Release Date: June 2007). this is ridiculous, he should have mentioned that the exploit is outdated. 2007?!
Another click bait. None of the guys commenting has tried it out and in order for this to work must be Adobe Reader 8.1. We are in 2022 cmon
Yeah but if the adobe program is cloosed wouldn't we loose reverse shell?
what if a person will open your pdf in browser and not in adobe reader ?
i dont get it, as soon as the file was created, where is it then?
how to find the path of the pdf we renamed please i didnt find it on desktop , thanks , and i appreaciate your work
i cant found the pdf aftar
If the target reboot his computer i still have acess to it ??
Full
Complete
Control
Entire
Computer
System
n i c e